{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T19:43:09Z","timestamp":1773517389378,"version":"3.50.1"},"reference-count":31,"publisher":"SAGE Publications","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2023,8,24]]},"abstract":"<jats:p>Rapid technological advances and network progress has occurred in recent decades, as has the global growth of services via the Internet. Consequently, piracy has become more prevalent, and many modern systems have been infiltrated, making it vital to build information security tools to identify new threats. An intrusion detection system (IDS) is a critical information security technology that detects network fluctuations with the help of machine learning (ML) and deep learning (DL) approaches. However, conventional techniques could be more effective in dealing with advanced attacks. So, this paper proposes an efficient DL approach for network intrusion detection (NID) using an optimal weight-based deep neural network (OWDNN). The network traffic data was initially collected from three openly available datasets: NSL-KDD, CSE-CIC-IDS2018 and UNSW-NB15. Then preprocessing was carried out on the collected data based on missing values imputation, one-hot encoding, and normalization. After that, the data under-sampling process is performed using the butterfly-optimized k-means clustering (BOKMC) algorithm to balance the unbalanced dataset. The relevant features from the balanced dataset are selected using inception version 3 with multi-head attention (IV3MHA) mechanism to reduce the computation burden of the classifier. After that, the dimensionality of the selected feature is reduced based on principal component analysis (PCA). Finally, the classification is done using OWDNN, which classifies the network traffic as normal and anomalous. Experiments on NSL-KDD, CSE-CIC-IDS2018 and UNSW-NB15 datasets show that the OWDNN performs better than the other ID methods.<\/jats:p>","DOI":"10.3233\/jifs-231758","type":"journal-article","created":{"date-parts":[[2023,7,11]],"date-time":"2023-07-11T10:18:59Z","timestamp":1689070739000},"page":"5123-5140","source":"Crossref","is-referenced-by-count":7,"title":["A novel attention-based feature learning and optimal deep learning approach for network intrusion detection"],"prefix":"10.1177","volume":"45","author":[{"given":"K.","family":"Sakthi","sequence":"first","affiliation":[{"name":"Department of ECE, Saveetha Engineering College, Chennai, Tamilnadu, India"}]},{"given":"P.","family":"Nirmal Kumar","sequence":"additional","affiliation":[{"name":"Department of ECE, Anna University, Chennai, Tamilnadu, India"}]}],"member":"179","reference":[{"key":"10.3233\/JIFS-231758_ref1","doi-asserted-by":"crossref","first-page":"e00497","DOI":"10.1016\/j.sciaf.2020.e00497","article-title":"Network intrusion detection system using supervised learning paradigm","volume":"9","author":"Mebawondu","year":"2020","journal-title":"Scientific African"},{"issue":"20","key":"10.3233\/JIFS-231758_ref3","doi-asserted-by":"crossref","first-page":"4221","DOI":"10.3390\/app9204221","article-title":"AE-CGAN model based high performance network intrusion detection system","volume":"9","author":"Lee","year":"2019","journal-title":"Applied Sciences"},{"key":"10.3233\/JIFS-231758_ref4","doi-asserted-by":"crossref","first-page":"102151","DOI":"10.1016\/j.cose.2020.102151","article-title":"RNNIDS: Enhancing network intrusion detection systems through deep learning","volume":"102","author":"Sohi","year":"2021","journal-title":"Computers & Security"},{"issue":"7","key":"10.3233\/JIFS-231758_ref6","doi-asserted-by":"crossref","first-page":"1392","DOI":"10.3390\/app9071392","article-title":"Network intrusion detection based on novel feature selection model and various recurrent neural networks","volume":"9","author":"Le","year":"2019","journal-title":"Applied Sciences"},{"key":"10.3233\/JIFS-231758_ref7","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/j.future.2021.03.024","article-title":"Multi-dimensional feature fusion and stacking ensemble mechanism for network intrusion detection","volume":"122","author":"Zhang","year":"2021","journal-title":"Future Generation Computer Systems"},{"key":"10.3233\/JIFS-231758_ref8","doi-asserted-by":"crossref","first-page":"101752","DOI":"10.1016\/j.cose.2020.101752","article-title":"A deep learning method with wrapper based feature extraction for wireless intrusion detection system","volume":"92","author":"Kasongo","year":"2020","journal-title":"Computers & Security"},{"key":"10.3233\/JIFS-231758_ref9","doi-asserted-by":"crossref","first-page":"101752","DOI":"10.1016\/j.cose.2020.101752","article-title":"A deep learning method with wrapper based feature extraction for wireless intrusion detection system","volume":"92","author":"Kasongo","year":"2020","journal-title":"Computers & Security"},{"key":"10.3233\/JIFS-231758_ref10","doi-asserted-by":"crossref","first-page":"106301","DOI":"10.1016\/j.asoc.2020.106301","article-title":"A survey and taxonomy of the fuzzy signature-based intrusion detection systems","volume":"92","author":"Masdari","year":"2020","journal-title":"Applied Soft Computing"},{"issue":"10","key":"10.3233\/JIFS-231758_ref11","doi-asserted-by":"crossref","first-page":"167","DOI":"10.3390\/fi12100167","article-title":"Comparison of machine learning and deep learning models for network intrusion detection systems","volume":"12","author":"Thapa","year":"2020","journal-title":"Future Internet"},{"issue":"1","key":"10.3233\/JIFS-231758_ref12","doi-asserted-by":"crossref","first-page":"e4150","DOI":"10.1002\/ett.4150","article-title":"Network intrusion detection system: A systematic study of machine learning and deep learning approaches","volume":"32","author":"Ahmad","year":"2021","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"key":"10.3233\/JIFS-231758_ref13","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1016\/j.procs.2021.05.025","article-title":"Network intrusion detection system using deep learning","volume":"185","author":"Ashiku","year":"2021","journal-title":"Procedia Computer Science"},{"issue":"1","key":"10.3233\/JIFS-231758_ref14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/s41598-022-19366-3","article-title":"ID-RDRL: a deep reinforcement learning-based feature selection intrusion detection model","volume":"12","author":"Ren","year":"2022","journal-title":"Scientific Reports"},{"issue":"12","key":"10.3233\/JIFS-231758_ref15","doi-asserted-by":"crossref","first-page":"9310","DOI":"10.1109\/JIOT.2021.3130434","article-title":"Hierarchical adversarial attacks against graph-neural-network-based IoT network intrusion detection system","volume":"9","author":"Zhou","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"key":"10.3233\/JIFS-231758_ref16","doi-asserted-by":"crossref","first-page":"105124","DOI":"10.1016\/j.knosys.2019.105124","article-title":"Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues","volume":"189","author":"Aldweesh","year":"2020","journal-title":"Knowledge-Based Systems"},{"issue":"22","key":"10.3233\/JIFS-231758_ref17","doi-asserted-by":"crossref","first-page":"11752","DOI":"10.3390\/app122211752","article-title":"A study of network intrusion detection systems using artificial intelligence\/machine learning","volume":"12","author":"Vanin","year":"2022","journal-title":"Applied Sciences"},{"issue":"3","key":"10.3233\/JIFS-231758_ref18","doi-asserted-by":"crossref","first-page":"41","DOI":"10.3390\/computers11030041","article-title":"Deep Q-learning based reinforcement learning approach for network intrusion detection","volume":"11","author":"Alavizadeh","year":"2022","journal-title":"Computers"},{"issue":"6","key":"10.3233\/JIFS-231758_ref19","doi-asserted-by":"crossref","first-page":"898","DOI":"10.3390\/electronics11060898","article-title":"A deep learning model for network intrusion detection with imbalanced data","volume":"11","author":"Fu","year":"2022","journal-title":"Electronics"},{"issue":"1","key":"10.3233\/JIFS-231758_ref20","doi-asserted-by":"crossref","first-page":"161","DOI":"10.3390\/sym14010161","article-title":"An efficient hyperparameter control method for a network intrusion detection system based on proximal policy optimization","volume":"14","author":"Han","year":"2022","journal-title":"Symmetry"},{"issue":"4","key":"10.3233\/JIFS-231758_ref21","doi-asserted-by":"crossref","first-page":"3527","DOI":"10.1007\/s10489-021-02621-x","article-title":"A lightweight intelligent network intrusion detection system using ocsvm and pigeon inspired optimizer","volume":"52","author":"Alazzam","year":"2022","journal-title":"Applied Intelligence"},{"issue":"3","key":"10.3233\/JIFS-231758_ref22","doi-asserted-by":"crossref","first-page":"530","DOI":"10.3390\/math10030530","article-title":"An efficient network intrusion detection and classification system","volume":"10","author":"Ahmad","year":"2022","journal-title":"Mathematics"},{"issue":"5","key":"10.3233\/JIFS-231758_ref23","doi-asserted-by":"crossref","first-page":"834","DOI":"10.3390\/pr9050834","article-title":"HCRNNIDS: Hybrid convolutional recurrent neural network-based network intrusion detection system","volume":"9","author":"Khan","year":"2021","journal-title":"Processes"},{"key":"10.3233\/JIFS-231758_ref24","doi-asserted-by":"crossref","first-page":"138432","DOI":"10.1109\/ACCESS.2021.3118573","article-title":"A double-layered hybrid approach for network intrusion detection system using combined naive bayes and SVM","volume":"9","author":"Wisanwanichthan","year":"2021","journal-title":"IEEE Access"},{"issue":"11","key":"10.3233\/JIFS-231758_ref25","doi-asserted-by":"crossref","first-page":"1771","DOI":"10.3390\/electronics9111771","article-title":"Toward developing efficient Conv-AE-based intrusion detection system using heterogeneous dataset","volume":"9","author":"Khan","year":"2020","journal-title":"Electronics"},{"key":"10.3233\/JIFS-231758_ref26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2021\/5557577","article-title":"Improving the performance of machine learning-based network intrusion detection systems on the UNSW-NB15 dataset","volume":"2021","author":"Moualla","year":"2021","journal-title":"Computational Intelligence and Neuroscience"},{"issue":"5","key":"10.3233\/JIFS-231758_ref27","doi-asserted-by":"crossref","first-page":"111","DOI":"10.3390\/fi13050111","article-title":"Designing a network intrusion detection system based on machine learning for software defined networks","volume":"13","author":"Alzahrani","year":"2021","journal-title":"Future Internet"},{"key":"10.3233\/JIFS-231758_ref28","first-page":"1","article-title":"A residual learning-based network intrusion detection system","volume":"2021","author":"Man","year":"2021","journal-title":"Security and Communication Networks"},{"key":"10.3233\/JIFS-231758_ref29","doi-asserted-by":"crossref","first-page":"32464","DOI":"10.1109\/ACCESS.2020.2973730","article-title":"Network intrusion detection combined hybrid sampling with deep hierarchical network","volume":"8","author":"Jiang","year":"2020","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-231758_ref30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2021\/7981670","article-title":"A hybrid butterfly optimization algorithm for numerical optimization problems","volume":"2021","author":"Zhou","year":"2021","journal-title":"Computational Intelligence and Neuroscience"},{"key":"10.3233\/JIFS-231758_ref31","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/j.ijin.2022.11.005","article-title":"An inception V3 approach for malware classification using machine learning and transfer learning","volume":"4","author":"Ahmed","year":"2023","journal-title":"International Journal of Intelligent Networks"},{"key":"10.3233\/JIFS-231758_ref32","doi-asserted-by":"crossref","first-page":"19854","DOI":"10.1109\/ACCESS.2021.3054521","article-title":"Short text sentiment analysis based on multi-channel CNN with multi-head attention mechanism","volume":"9","author":"Feng","year":"2021","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-231758_ref33","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.inffus.2021.02.007","article-title":"On learning effective ensembles of deep neural networks for intrusion detection","volume":"72","author":"Folino","year":"2021","journal-title":"Information Fusion"}],"updated-by":[{"DOI":"10.1177\/10641246251331509","type":"retraction","label":"Retraction","source":"retraction-watch","updated":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T00:00:00Z","timestamp":1744848000000},"record-id":"63992"},{"DOI":"10.1177\/10641246251331509","type":"retraction","label":"Retraction","source":"publisher","updated":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T00:00:00Z","timestamp":1744848000000}}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-231758","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T08:56:23Z","timestamp":1769676983000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-231758"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,24]]},"references-count":31,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.3233\/jifs-231758","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,24]]}}}